Face Recognition Technology By Catherine jenni christy.M.sc.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

NC DMV License and Theft Bureau
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
Overview of Computer Vision CS491E/791E. What is Computer Vision? Deals with the development of the theoretical and algorithmic basis by which useful.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
Investigation of Two Licensed Biometric Products Using Neurotechnology’s VeriLook and VeriFinger software.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Computer ethics. Lesson objectives To learn about Computer Ethics and Copyright Intellectual Property Biometrics Commercial software Open Source Software.
Facial Recognition Facial recognition software - based on the ability to recognize a face and then measure the various features of the face. Each human.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Marjie Rodrigues
Facial Recognition CSE 391 Kris Lord.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
Sarchrmalsha Sarah Wilson, Christine Martin, Mallory Lehr, and Shania Wright A.
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Access Control Via Face Recognition. Group Members  Thilanka Priyankara  Vimalaharan Paskarasundaram  Manosha Silva  Dinusha Perera.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
Biometrics Authentication Technology
IRIS RECOGNITION. CONTENTS  1. INTRODUCTION  2. IRIS RECOGNITION  3. HISTORY AND DEVELOPMENT  4. SCIENCE BEHIND THE TECHNOLOGY  5. IMAGE ACQUISITION.
Facial Recognition
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Welcome Topic : Security.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Physical Security Secure the room Secure the machine – 6 ways.
Biometric Security Derek Foster. Overview What is Biometric Security? How it Works –Comparisons Types –Fingerprints –Iris Vs. Retina scans –Palm Vein.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Face Detection 蔡宇軒.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
By: Suvigya Tripathi (09BEC094) Ankit V. Gupta (09BEC106) Guided By: Prof. Bhupendra Fataniya Dept. of Electronics and Communication Engineering, Nirma.
FACE RECOGNITION. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a.
Biometrics Security in Banking Systems Image processing in ATM
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
Face Recognition 1.
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Seminar Presentation on Biometrics
Facial Recognition in Biometrics
Biometric technology.
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presentation transcript:

Face Recognition Technology By Catherine jenni christy.M.sc

Definition of FRT  Humans are very good at recognizing faces and if computers complex patterns.  Even a passage of time doesn't affect this capability and therefore it would help become as robust as humans in face recognition. Machine recognition of human faces from still or video images has attracted a great deal of attention in the psychology, image processing, pattern recognition, neural science, computer security, and computer vision communities.

Work of FRT  Face recognition is probably one of the most non-intrusive and user-friendly biometric authentication methods currently available;  A screensaver equipped with face recognition technology can automatically unlock the screen whenever the authorized user approaches the computer.

 Face is an important part of who we are and how people identify us. It is arguably a person's most unique physical characteristic.  While humans have had the innate ability to recognize and distinguish different faces for millions of years, computers are just now catching up.

 Visionics a company based in New Jersey, is one of many developers of facial recognition technology. The twist to its particular software, Face It, is that it can pick someone's face out of a crowd, extract that face from the rest of the scene and compare it to a database full of stored images. In order for Face Recognition Technology software to work, it has to know what a basic face looks like

 Facial recognition software is designed to pinpoint a face and measure its features. Each face has certain distinguishable landmarks, which make up the different facial features.  These landmarks are referred to as nodal points. There are about 80 nodal points on a human face. Here are a few of the nodal points that are measured by the software

Distance between eyes  Width of nose  Depth of eye sockets  Cheekbones  Jaw line  Chin

Software of Face Recognition Technology  Facial recognition software falls into a larger group of technologies known as biometrics. Biometrics uses biological information to verify identity.  The basic idea behind biometrics is that our bodies contain unique properties that can be used to distinguish us from others.  Besides facial recognition, biometric authentication methods also include:  Fingerprint scan  Retina scan  Voice identification

 These nodal points are measured to create a numerical code, a string of numbers that represents the face in a database. This code is called a face print. Only 14 to 22 nodal points are needed for the Face It software to complete the recognition process.  Facial recognition methods generally involve a series of steps that serve to capture, analyze and compare a face to a database of stored images.

 The basic processes used by the FaceIt system to capture and compare images are:  Detection  Alignment  Normalization  Representation  Matching

1.Detection  When the system is attached to a video surveillance system, the recognition software searches the field of view of a video camera for faces. If there is a face in the view, it is detected within a fraction of a second.  A multi-scale algorithm is used to search for faces in low resolution. The system switches to a high-resolution search only after a head-like shape is detected.

2. Alignment  Once a face is detected, the system determines the head's position, size and pose.  A face needs to be turned at least 35 degrees toward the camera for the system to register it.

3. Normalization -  The image of the head is scaled and rotated so that it can be registered and mapped into an appropriate size and pose.  Normalization is performed regardless of the head's location and distance from the camera. Light does not impact the normalization process.

4. Representation  The system translates the facial data into a unique code.This coding process allows for easier comparison of the newly acquired facial data to stored facial data.

5. Matching  The newly acquired facial data is compared to the stored data and (ideally) linked to at least one stored facial representation.

CONCLUSION  I hope you got a new Information Form my Seminar Topic Face Recognition Technology.